Security
Security is foundational to Vizkraft. Your data never leaves your infrastructure — we only work with metadata and real-time query results.
Security Architecture
Encryption Everywhere
All data is encrypted in transit using TLS 1.3 and at rest using AES-256. Database connections use SSL/TLS with certificate verification.
Zero Data Retention
We never store your raw query results. Data flows through our engine in real-time and is discarded after visualization. Only schema metadata is cached.
Isolated Infrastructure
Each organization's workload runs in isolated compute environments. Enterprise customers can opt for dedicated infrastructure with custom network policies.
Access Controls
Role-based access control (RBAC) with organization-level permissions. API keys are hashed and never stored in plaintext. SSO support via SAML 2.0 for Enterprise.
Continuous Monitoring
24/7 infrastructure monitoring with automated alerting. Regular vulnerability scanning and annual penetration testing by third-party security firms.
Secure Development
We follow secure SDLC practices including code reviews, dependency scanning, static analysis, and automated security testing in our CI/CD pipeline.
How Your Data Flows
- 1
Connection
You provide read-only database credentials. Credentials are encrypted with AES-256 and stored in an isolated secrets vault.
- 2
Schema Indexing
We read your table structures and column metadata to build a semantic model. No row-level data is accessed during indexing.
- 3
Query Execution
When you ask a question, our AI generates SQL. The query is executed against your database via a secure, encrypted connection.
- 4
Visualization
Results are streamed to your browser and rendered as charts. Data is held in memory only during rendering and never written to disk.
Operational Practices
- All employees undergo background checks and security awareness training
- Principle of least privilege applied to all internal systems
- Multi-factor authentication required for all internal access
- Incident response plan with defined escalation procedures
- Regular disaster recovery and business continuity testing
- Vendor security assessments conducted before onboarding third parties
Responsible Disclosure
If you discover a security vulnerability, please report it responsibly to security@vizkraft.com. We acknowledge reports within 24 hours and aim to resolve critical issues within 72 hours. We do not pursue legal action against good-faith security researchers.